Fault-tolerant systems:
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cambridge (Mass.)
Elsevier
2021
MK, Morgan Kaufmann Publishers, an imprint of Elsevier |
Ausgabe: | 2nd edition |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XIII, 402 Seiten Illustrationen, Diagramme 24 cm |
ISBN: | 9780128181058 0128181052 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047241838 | ||
003 | DE-604 | ||
005 | 20210527 | ||
007 | t | ||
008 | 210416s2021 a||| b||| 00||| eng d | ||
020 | |a 9780128181058 |c br |9 978-0-12-818105-8 | ||
020 | |a 0128181052 |c br |9 0-12-818105-2 | ||
035 | |a (OCoLC)1256443934 | ||
035 | |a (DE-599)BVBBV047241838 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 233 |0 (DE-625)143620: |2 rvk | ||
100 | 1 | |a Koren, Israel |d 1945- |e Verfasser |0 (DE-588)172194202 |4 aut | |
245 | 1 | 0 | |a Fault-tolerant systems |c Israel Koren ; C. Mani Krishna |
250 | |a 2nd edition | ||
264 | 1 | |a Cambridge (Mass.) |b Elsevier | |
264 | 1 | |b MK, Morgan Kaufmann Publishers, an imprint of Elsevier |c 2021 | |
300 | |a XIII, 402 Seiten |b Illustrationen, Diagramme |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
337 | |b n |2 isbdmedia |2 rdamedia | ||
650 | 0 | 7 | |a Software |0 (DE-588)4055382-6 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hardware |0 (DE-588)4023422-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Fehlertoleranz |0 (DE-588)4123192-2 |2 gnd |9 rswk-swf |
653 | 0 | |a Tolérance aux fautes (informatique) | |
653 | 0 | |a Ordinateurs / Fiabilité | |
689 | 0 | 0 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Software |0 (DE-588)4055382-6 |D s |
689 | 1 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Hardware |0 (DE-588)4023422-8 |D s |
689 | 2 | 1 | |a Fehlertoleranz |0 (DE-588)4123192-2 |D s |
689 | 2 | |5 DE-604 | |
700 | 1 | |a Krishna, C. Mani |d ca. 20./21. Jh. |e Verfasser |0 (DE-588)1234193140 |4 aut | |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032646088&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032646088 |
Datensatz im Suchindex
_version_ | 1804182379679449088 |
---|---|
adam_text | Contents Preface to the Second Edition........................................................................................................... Acknowledgments ............................................................................................................................. CHAPTER 1 1.1 1.2 1.3 1.4 1.5 CHAPTER 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 xi xiii Preliminaries......................................................................................................... Fault Classification ................................................................................................ Types of Redundancy............................................................................................. Basic Measures of Fault Tolerance....................................................................... 1.3.1 Traditional Measures.................................................................................. 1.3.2 Network Measures ................................................................ Outline of This Book............................................................................................. Further Reading...................................................................................................... References............................................................................................................... 1 1 3 4 4 6 6 8 9 Hardware Fault Tolerance............................................................................... 11 11 13 15 16 16 17 17 18 18 19 20 20 21 24 26 27 30 33 33 35 39 39 41 43 45 49 The Rate of
Hardware Failure .............................................................................. Failure Rate, Reliability, and Mean Time to Failure .......................................... Hardware Failure Mechanisms.............................................................................. 2.3.1 Electromigration......................................................................................... 2.3.2 Stress Migration......................................................................................... 2.3.3 Negative Bias Temperature Instability................................... 2.3.4 Hot Carrier Injection.................................................................................. 2.3.5 Time-Dependent Dielectric Breakdown................................................... 2.3.6 Putting It All Together................................................................................ Common-Mode Failures ....................................................................................... Canonical and Resilient Structures....................................................................... 2.5.1 Series and Parallel Systems....................................................................... 2.5.2 Nonseries/Parallel Systems....................................................................... 2.5.3 M-of-N Systems......................................................................................... 2.5.4 Voters........................................................................................................... 2.5.5 Variations on N-Modular
Redundancy..................................................... 2.5.6 Duplex Systems ......................................................................................... Other Reliability Evaluation Techniques ............................................................ 2.6.1 Poisson Processes....................................................................................... 2.6.2 Markov Models........................................................................................... Fault-Tolerance Processor-Level Techniques ...................................................... 2.7.1 Watchdog Processor .................................................................................. 2.7.2 Simultaneous Multithreading for Fault Tolerance.................................... Timing Fault Tolerance ......................................................................................... Tolerance of Byzantine Failures............................................................................ 2.9.1 Byzantine Agreement With Message Authentication............................ V
vi Contents 2.10 2.11 Further Reading....................................................................................................... Exercises.................................................................................................................. References................................................................................................................ 50 51 55 CHAPTER 3 3.1 Information Redundancy......................................................................................... Coding ..................................................................................................................... 3.1.1 Parity Codes................................................................................................. 3.1.2 Checksum..................................................................................................... 3.1.3 M-of-N Codes............................................................................................ 3.1.4 Berger Code................................................................................................. 3.1.5 Cyclic Codes................................................................................................. 3.1.6 Arithmetic Codes ........................................................................................ 3.1.7 Local Hard and Soft Decisions ................................................................. Resilient Disk Systems .......................................................................................... 3.2.1 RAID
Leveli.............................................................................................. 3.2.2 RAID Level 2.............................................................................................. 3.2.3 RAID Level 3.............................................................................................. 3.2.4 RAID Level 4.............................................................................................. 3.2.5 RAID Level 5.............................................................................................. 3.2.6 Hierarchical RAID ...................................................................................... 3.2.7 Modeling Correlated Failures .................................................................... 3.2.8 RAID With Solid-State Disks .................................................................... Data Replication ..................................................................................................... 3.3.1 Voting: Nonhierarchical Organization ...................................................... 3.3.2 Voting: Hierarchical Organization............................................................. 3.3.3 Primary-Backup Approach ........................................................................ Algorithm-Based Fault Tolerance.......................................................................... Further Reading.......................................................................................................
Exercises................................................................................................................... References................................................................................................................ 59 59 61 66 68 68 69 75 79 86 86 87 88 89 90 91 92 96 97 98 103 104 106 108 109 112 Fault-Tolerant Networks........................................................................................ Measures of Resilience .......................................................................................... 4.1.1 Graph Theoretical Measures...................................................................... 4.1.2 Computer Networks Measures.................................................................... 4.2 Common Network Topologies and Their Resilience........................................... 4.2.1 Multistage and Extra-Stage Networks ...................................................... 4.2.2 Crossbar Networks...................................................................................... 4.2.3 Rectangular Mesh and Interstitial Mesh.................................................... 4.2.4 Hypercube Network ................................................................................... 4.2.5 Cube-Connected Cycles Networks............................................................. 4.2.6 Loop Networks............................................................................................ 4.2.7 Tree Networks ............................................................................................ 4.2.8 Ad
Hoc Point-to-Point Networks............................................................... 4.3 Fault-Tolerant Routing............................................................................................ 115 116 116 116 117 118 123 125 127 131 132 134 136 139 3.2 3.3 3.4 3.5 3.6 CHAPTER 4 4.1
Contents 4.4 4.5 4.6 4.7 CHAPTER 5 5.1 5.2 vii 4.3.1 Hypercube Fault-Tolerant Routing............................................................ 4.3.2 Origin-Based Routing in the Mesh .......................................................... Networks on a Chip................................................................................................ 4.4.1 Router Fault Tolerance .............................................................................. 4.4.2 Links ........................................................................................................... 4.4.3 Routing in the Presence of Failure............................................................ Wireless Sensor Networks..................................................................................... 4.5.1 Basics............................................................................................................ 4.5.2 Sensor Network Failures............................................................................ 4.5.3 Sensor Network Fault Tolerance ............................................................... Further Reading....................................................................................................... Exercises.................................................................................................................. References................................................................................................................ 139 141 144 145 147 148 149 149 150 150 153 154 157 Software Fault Tolerance
...................................................................................... 161 161 163 163 165 169 171 173 174 175 179 181 181 182 183 185 185 186 186 189 189 189 190 191 192 193 194 194 194 196 197 Acceptance Tests..................................................................................................... Single-Version Fault Tolerance ............................................................................ 5.2.1 Wrappers ..................................................................................................... 5.2.2 Software Rejuvenation .............................................................................. 5.2.3 Data Diversity.............................................................................................. 5.2.4 Software-Implemented Hardware Fault Tolerance (SIHFT).................. 5.3 N-Version Programming....................................................................................... 5.3.1 Consistent Comparison Problem............................................................... 5.3.2 Version Independence................................................................................. 5.3.3 Other Issues in N-Version Programming................................................. 5.4 Recovery Block Approach..................................................................................... 5.4.1 Basic Principles .......................................................................................... 5.4.2 Success Probability Calculation.................................................................
5.4.3 Distributed Recovery Blocks..................................................................... 5.5 Preconditions, Postconditions, and Assertions ................................................... 5.6 Exception Handling................................................................................................ 5.6.1 Requirements From Exception Handlers................................................. 5.6.2 Basics of Exceptions and Exception Handling........................................ 5.6.3 Language Support....................................................................................... 5.7 Software Reliability Models................................................................................... 5.7.1 Jelinski-Moranda Model............................................................................ 5.7.2 Littlewood-Verrall Model.......................................................................... 5.7.3 Musa-Okumoto Model.............................................................................. 5.7.4 Ostrand-Weyuker-Bell (OWB) Fault Model........................................... 5.7.5 Model Selection and Parameter Estimation ............................................. 5.8 Fault-Tolerant Remote Procedure Calls ............................................................... 5.8.1 Primary-Backup Approach ........................................................................ 5.8.2 The Circus Approach ................................................................................ 5.9 Further
Reading....................................................................................................... 5.10 Exercises..................................................................................................................
viii Contents CHAPTER 6 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 CHAPTER 7 7.1 7.2 7.3 7.4 7.5 7.6 7.7 References................................................................................................................ 199 Checkpointing....................................................................................................... What Is Checkpointing?......................................................................................... 6.1.1 Why Is Checkpointing Nontrivial? .......................................................... Checkpoint Level..................................................................................................... Optimal Checkpointing:an Analytical Model....................................................... 6.3.1 Time Between Checkpoints—a First-Order Approximation.................. 6.3.2 Optimal Checkpoint Placement................................................................. 6.3.3 Time Between Checkpoints: a More Accurate Model............................. 6.3.4 Reducing Overhead..................................................................................... 6.3.5 Reducing Latency....................................................................................... Cache-Aided Rollback Error Recovery (CARER) ............................................. Checkpointing in Distributed Systems................................................................. 6.5.1 The Domino Effect and Livelock............................................................... 6.5.2 A Coordinated Checkpointing Algorithm
............................................... 6.5.3 Time-Based Synchronization..................................................................... 6.5.4 Diskless Checkpointing.............................................................................. 6.5.5 Message Logging....................................................................................... Checkpointing in Shared-Memory Systems ........................................................ 6.6.1 Bus-Based Coherence Protocol................................................................ 6.6.2 Directory-Based Protocol .......................................................................... Checkpointing in Real-Time Systems................................................................... Checkpointing While Using Cloud Computing Utilities.................................... Emerging Challenges: Petascale and Exascale Computing ............................... Other Uses of Checkpointing................................................................................. Further Reading....................................................................................................... Exercises.................................................................................................................. References................................................................................................................ 203 205 206 207 207 208 209 210 211 212 213 214 215 217 218 219 219 223 223 224 225 228 228 229 230 231 233 Cyber-Physical
Systems....................................................................................... Structure of a Cyber-Physical System................................................................... The Controlled Plant State Space.......................................................................... Sensors.................................................................................................................... 7.3.1 Calibration .................................................................................................. 7.3.2 Detecting Faulty Sensors............................................................................ 7.3.3 Confidence Measures for Intervals............................................................ The Cyber Platform................................................................................................ 7.4.1 Isolation....................................................................................................... 7.4.2 Loadshedding............................................................................................ 7.4.3 Overrun Absorption ................................................................................... Actuators.................................................................................................................. Further Reading....................................................................................................... Exercises..................................................................................................................
References................................................................................................................ 237 238 240 242 244 245 250 252 253 255 256 256 259 260 261
Contents CHAPTER 8 8.1 ix Casestudies......................................................................................................... Aerospace Systems ................................................................................................ 8.1.1 Protecting Against Radiation..................................................................... 8.1.2 Flight Control System: Boeing 777 .......................................................... NonStop Systems .................................................................................................. 8.2.1 Architecture ................................................................................................ 8.2.2 Maintenance and Repair Aids ................................................................... 8.2.3 Software....................................................................................................... 8.2.4 Modifications to the NonStop Architecture ............................................. Stratus Systems...................................................................................................... Cassini Command and Data Subsystem.............................................................. IBM POWER8 ...................................................................................................... IBM G5.................................................................................................................... IBM Sysplex........................................................................................................... Intel Servers
........................................................................................................... 8.8.1 Itanium......................................................................................................... 8.8.2 Xeon............................................................................................................. Oracle SPARC M8 Server ..................................................................................... Cloud Computing .................................................................................................. 8.10.1 Checkpointing in Response to Spot Pricing............................................ 8.10.2 Proactive Virtual Machine Migration........................................................ 8.10.3 Fault Tolerance as a Service ..................................................................... Further Reading...................................................................................................... References............................................................................................................... 263 263 263 264 266 267 269 269 270 272 274 276 277 278 280 280 282 284 285 285 286 286 287 288 CHAPTER 9 Simulation Techniques........................................................................................... 9.1 Writing a Simulation Program.............................................................................. 9.2 Parameter Estimation............................................................................................. 9.2.1 Point Versus Interval Estimation
.............................................................. 9.2.2 Method of Moments .................................................................................. 9.2.3 Method of Maximum Likelihood.............................................................. 9.2.4 The Bayesian Approach to Parameter Estimation.................................... 9.2.5 Confidence Intervals.................................................................................. 9.3 Variance Reduction Methods................................................................................ 9.3.1 Antithetic Variables..................................................................................... 9.3.2 Using Control Variables ............................................................................ 9.3.3 Stratified Sampling..................................................................................... 9.3.4 Importance Sampling ................................................................................ 9.4 Splitting .................................................................................................................. 9.5 Random Number Generation................................................................................ 9.5.1 Uniformly Distributed Random Number Generators ............................. 9.5.2 Testing Uniform Random Number Generators........................................ 9.5.3 Generating Other Distributions ................................................................. 9.6 Fault
Injection......................................................................................................... 9.6.1 Types of Fault Injection Techniques.......................................................... 291 291 294 294 295 297 300 301 305 305 307 307 309 316 321 321 324 327 332 332 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11
x Contents 9.6.2 Fault Injection Application and Tools ...................................................... Further Reading....................................................................................................... Exercises.................................................................................................................. References................................................................................................................ 334 335 336 338 CHAPTER 10 10.1 10.2 10.3 Defect Tolerance in VLSI Circuits ........................................................................ 341 CHAPTER 11 11.1 Fault Detection in Cryptographic Systems .......................................................... 373 Overview of Ciphers .............................................................................................. 11.1.1 Symmetric Key Ciphers ............................................................................. 11.1.2 Public Key Ciphers...................................................................................... Security Attacks Through Fault Injection............................................................. 11.2.1 Fault Attacks on Symmetric Key Ciphers ............................................... 11.2.2 Fault Attacks on Public (Asymmetric) Key Ciphers............................... Countermeasures...................................................................................................... 11.3.1 Spatial and Temporal Duplication............................................................. 11.3.2 Error-
Detecting Codes................................................................................. 11.3.3 Are These Countermeasure Sufficient? .................................................... 11.3.4 Final Comment............................................................................................ Further Reading........................................................................................................ Exercises................................................................................................................... References................................................................................................................ 373 374 381 383 384 385 385 386 386 389 391 392 392 393 9.7 9.8 Manufacturing Defects and Circuit Faults ........................................................... Probability of Failure and Critical Area................................................................ Basic Yield Models................................................................................................. 10.3.1 The Poisson and Compound Poisson Yield Models ............................... 10.3.2 Variations on the Simple Yield Models .................................................... 10.4 Yield Enhancement Through Redundancy ........................................................... 10.4.1 Yield Projection for Chips With Redundancy........................................... 10.4.2 Memory Arrays With Redundancy .......................................................... 10.4.3 Logic Integrated Circuits With
Redundancy............................................. 10.4.4 Modifying the Floorplan............................................................................ 10.5 Further Reading........................................................................................................ 10.6 Exercises.................................................................................................................. References................................................................................................................ 11.2 11.3 11.4 11.5 Index 341 343 345 345 347 349 349 353 359 361 364 366 369 395
|
adam_txt |
Contents Preface to the Second Edition. Acknowledgments . CHAPTER 1 1.1 1.2 1.3 1.4 1.5 CHAPTER 2 2.1 2.2 2.3 2.4 2.5 2.6 2.7 2.8 2.9 xi xiii Preliminaries. Fault Classification . Types of Redundancy. Basic Measures of Fault Tolerance. 1.3.1 Traditional Measures. 1.3.2 Network Measures . Outline of This Book. Further Reading. References. 1 1 3 4 4 6 6 8 9 Hardware Fault Tolerance. 11 11 13 15 16 16 17 17 18 18 19 20 20 21 24 26 27 30 33 33 35 39 39 41 43 45 49 The Rate of
Hardware Failure . Failure Rate, Reliability, and Mean Time to Failure . Hardware Failure Mechanisms. 2.3.1 Electromigration. 2.3.2 Stress Migration. 2.3.3 Negative Bias Temperature Instability. 2.3.4 Hot Carrier Injection. 2.3.5 Time-Dependent Dielectric Breakdown. 2.3.6 Putting It All Together. Common-Mode Failures . Canonical and Resilient Structures. 2.5.1 Series and Parallel Systems. 2.5.2 Nonseries/Parallel Systems. 2.5.3 M-of-N Systems. 2.5.4 Voters. 2.5.5 Variations on N-Modular
Redundancy. 2.5.6 Duplex Systems . Other Reliability Evaluation Techniques . 2.6.1 Poisson Processes. 2.6.2 Markov Models. Fault-Tolerance Processor-Level Techniques . 2.7.1 Watchdog Processor . 2.7.2 Simultaneous Multithreading for Fault Tolerance. Timing Fault Tolerance . Tolerance of Byzantine Failures. 2.9.1 Byzantine Agreement With Message Authentication. V
vi Contents 2.10 2.11 Further Reading. Exercises. References. 50 51 55 CHAPTER 3 3.1 Information Redundancy. Coding . 3.1.1 Parity Codes. 3.1.2 Checksum. 3.1.3 M-of-N Codes. 3.1.4 Berger Code. 3.1.5 Cyclic Codes. 3.1.6 Arithmetic Codes . 3.1.7 Local Hard and Soft Decisions . Resilient Disk Systems . 3.2.1 RAID
Leveli. 3.2.2 RAID Level 2. 3.2.3 RAID Level 3. 3.2.4 RAID Level 4. 3.2.5 RAID Level 5. 3.2.6 Hierarchical RAID . 3.2.7 Modeling Correlated Failures . 3.2.8 RAID With Solid-State Disks . Data Replication . 3.3.1 Voting: Nonhierarchical Organization . 3.3.2 Voting: Hierarchical Organization. 3.3.3 Primary-Backup Approach . Algorithm-Based Fault Tolerance. Further Reading.
Exercises. References. 59 59 61 66 68 68 69 75 79 86 86 87 88 89 90 91 92 96 97 98 103 104 106 108 109 112 Fault-Tolerant Networks. Measures of Resilience . 4.1.1 Graph Theoretical Measures. 4.1.2 Computer Networks Measures. 4.2 Common Network Topologies and Their Resilience. 4.2.1 Multistage and Extra-Stage Networks . 4.2.2 Crossbar Networks. 4.2.3 Rectangular Mesh and Interstitial Mesh. 4.2.4 Hypercube Network . 4.2.5 Cube-Connected Cycles Networks. 4.2.6 Loop Networks. 4.2.7 Tree Networks . 4.2.8 Ad
Hoc Point-to-Point Networks. 4.3 Fault-Tolerant Routing. 115 116 116 116 117 118 123 125 127 131 132 134 136 139 3.2 3.3 3.4 3.5 3.6 CHAPTER 4 4.1
Contents 4.4 4.5 4.6 4.7 CHAPTER 5 5.1 5.2 vii 4.3.1 Hypercube Fault-Tolerant Routing. 4.3.2 Origin-Based Routing in the Mesh . Networks on a Chip. 4.4.1 Router Fault Tolerance . 4.4.2 Links . 4.4.3 Routing in the Presence of Failure. Wireless Sensor Networks. 4.5.1 Basics. 4.5.2 Sensor Network Failures. 4.5.3 Sensor Network Fault Tolerance . Further Reading. Exercises. References. 139 141 144 145 147 148 149 149 150 150 153 154 157 Software Fault Tolerance
. 161 161 163 163 165 169 171 173 174 175 179 181 181 182 183 185 185 186 186 189 189 189 190 191 192 193 194 194 194 196 197 Acceptance Tests. Single-Version Fault Tolerance . 5.2.1 Wrappers . 5.2.2 Software Rejuvenation . 5.2.3 Data Diversity. 5.2.4 Software-Implemented Hardware Fault Tolerance (SIHFT). 5.3 N-Version Programming. 5.3.1 Consistent Comparison Problem. 5.3.2 Version Independence. 5.3.3 Other Issues in N-Version Programming. 5.4 Recovery Block Approach. 5.4.1 Basic Principles . 5.4.2 Success Probability Calculation.
5.4.3 Distributed Recovery Blocks. 5.5 Preconditions, Postconditions, and Assertions . 5.6 Exception Handling. 5.6.1 Requirements From Exception Handlers. 5.6.2 Basics of Exceptions and Exception Handling. 5.6.3 Language Support. 5.7 Software Reliability Models. 5.7.1 Jelinski-Moranda Model. 5.7.2 Littlewood-Verrall Model. 5.7.3 Musa-Okumoto Model. 5.7.4 Ostrand-Weyuker-Bell (OWB) Fault Model. 5.7.5 Model Selection and Parameter Estimation . 5.8 Fault-Tolerant Remote Procedure Calls . 5.8.1 Primary-Backup Approach . 5.8.2 The Circus Approach . 5.9 Further
Reading. 5.10 Exercises.
viii Contents CHAPTER 6 6.1 6.2 6.3 6.4 6.5 6.6 6.7 6.8 6.9 6.10 6.11 6.12 CHAPTER 7 7.1 7.2 7.3 7.4 7.5 7.6 7.7 References. 199 Checkpointing. What Is Checkpointing?. 6.1.1 Why Is Checkpointing Nontrivial? . Checkpoint Level. Optimal Checkpointing:an Analytical Model. 6.3.1 Time Between Checkpoints—a First-Order Approximation. 6.3.2 Optimal Checkpoint Placement. 6.3.3 Time Between Checkpoints: a More Accurate Model. 6.3.4 Reducing Overhead. 6.3.5 Reducing Latency. Cache-Aided Rollback Error Recovery (CARER) . Checkpointing in Distributed Systems. 6.5.1 The Domino Effect and Livelock. 6.5.2 A Coordinated Checkpointing Algorithm
. 6.5.3 Time-Based Synchronization. 6.5.4 Diskless Checkpointing. 6.5.5 Message Logging. Checkpointing in Shared-Memory Systems . 6.6.1 Bus-Based Coherence Protocol. 6.6.2 Directory-Based Protocol . Checkpointing in Real-Time Systems. Checkpointing While Using Cloud Computing Utilities. Emerging Challenges: Petascale and Exascale Computing . Other Uses of Checkpointing. Further Reading. Exercises. References. 203 205 206 207 207 208 209 210 211 212 213 214 215 217 218 219 219 223 223 224 225 228 228 229 230 231 233 Cyber-Physical
Systems. Structure of a Cyber-Physical System. The Controlled Plant State Space. Sensors. 7.3.1 Calibration . 7.3.2 Detecting Faulty Sensors. 7.3.3 Confidence Measures for Intervals. The Cyber Platform. 7.4.1 Isolation. 7.4.2 Loadshedding. 7.4.3 Overrun Absorption . Actuators. Further Reading. Exercises.
References. 237 238 240 242 244 245 250 252 253 255 256 256 259 260 261
Contents CHAPTER 8 8.1 ix Casestudies. Aerospace Systems . 8.1.1 Protecting Against Radiation. 8.1.2 Flight Control System: Boeing 777 . NonStop Systems . 8.2.1 Architecture . 8.2.2 Maintenance and Repair Aids . 8.2.3 Software. 8.2.4 Modifications to the NonStop Architecture . Stratus Systems. Cassini Command and Data Subsystem. IBM POWER8 . IBM G5. IBM Sysplex. Intel Servers
. 8.8.1 Itanium. 8.8.2 Xeon. Oracle SPARC M8 Server . Cloud Computing . 8.10.1 Checkpointing in Response to Spot Pricing. 8.10.2 Proactive Virtual Machine Migration. 8.10.3 Fault Tolerance as a Service . Further Reading. References. 263 263 263 264 266 267 269 269 270 272 274 276 277 278 280 280 282 284 285 285 286 286 287 288 CHAPTER 9 Simulation Techniques. 9.1 Writing a Simulation Program. 9.2 Parameter Estimation. 9.2.1 Point Versus Interval Estimation
. 9.2.2 Method of Moments . 9.2.3 Method of Maximum Likelihood. 9.2.4 The Bayesian Approach to Parameter Estimation. 9.2.5 Confidence Intervals. 9.3 Variance Reduction Methods. 9.3.1 Antithetic Variables. 9.3.2 Using Control Variables . 9.3.3 Stratified Sampling. 9.3.4 Importance Sampling . 9.4 Splitting . 9.5 Random Number Generation. 9.5.1 Uniformly Distributed Random Number Generators . 9.5.2 Testing Uniform Random Number Generators. 9.5.3 Generating Other Distributions . 9.6 Fault
Injection. 9.6.1 Types of Fault Injection Techniques. 291 291 294 294 295 297 300 301 305 305 307 307 309 316 321 321 324 327 332 332 8.2 8.3 8.4 8.5 8.6 8.7 8.8 8.9 8.10 8.11
x Contents 9.6.2 Fault Injection Application and Tools . Further Reading. Exercises. References. 334 335 336 338 CHAPTER 10 10.1 10.2 10.3 Defect Tolerance in VLSI Circuits . 341 CHAPTER 11 11.1 Fault Detection in Cryptographic Systems . 373 Overview of Ciphers . 11.1.1 Symmetric Key Ciphers . 11.1.2 Public Key Ciphers. Security Attacks Through Fault Injection. 11.2.1 Fault Attacks on Symmetric Key Ciphers . 11.2.2 Fault Attacks on Public (Asymmetric) Key Ciphers. Countermeasures. 11.3.1 Spatial and Temporal Duplication. 11.3.2 Error-
Detecting Codes. 11.3.3 Are These Countermeasure Sufficient? . 11.3.4 Final Comment. Further Reading. Exercises. References. 373 374 381 383 384 385 385 386 386 389 391 392 392 393 9.7 9.8 Manufacturing Defects and Circuit Faults . Probability of Failure and Critical Area. Basic Yield Models. 10.3.1 The Poisson and Compound Poisson Yield Models . 10.3.2 Variations on the Simple Yield Models . 10.4 Yield Enhancement Through Redundancy . 10.4.1 Yield Projection for Chips With Redundancy. 10.4.2 Memory Arrays With Redundancy . 10.4.3 Logic Integrated Circuits With
Redundancy. 10.4.4 Modifying the Floorplan. 10.5 Further Reading. 10.6 Exercises. References. 11.2 11.3 11.4 11.5 Index 341 343 345 345 347 349 349 353 359 361 364 366 369 395 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Koren, Israel 1945- Krishna, C. Mani ca. 20./21. Jh |
author_GND | (DE-588)172194202 (DE-588)1234193140 |
author_facet | Koren, Israel 1945- Krishna, C. Mani ca. 20./21. Jh |
author_role | aut aut |
author_sort | Koren, Israel 1945- |
author_variant | i k ik c m k cm cmk |
building | Verbundindex |
bvnumber | BV047241838 |
classification_rvk | ST 233 |
ctrlnum | (OCoLC)1256443934 (DE-599)BVBBV047241838 |
discipline | Informatik |
discipline_str_mv | Informatik |
edition | 2nd edition |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02058nam a2200505 c 4500</leader><controlfield tag="001">BV047241838</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20210527 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">210416s2021 a||| b||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780128181058</subfield><subfield code="c">br</subfield><subfield code="9">978-0-12-818105-8</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0128181052</subfield><subfield code="c">br</subfield><subfield code="9">0-12-818105-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1256443934</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047241838</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 233</subfield><subfield code="0">(DE-625)143620:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Koren, Israel</subfield><subfield code="d">1945-</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)172194202</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Fault-tolerant systems</subfield><subfield code="c">Israel Koren ; C. Mani Krishna</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">2nd edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cambridge (Mass.)</subfield><subfield code="b">Elsevier</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="b">MK, Morgan Kaufmann Publishers, an imprint of Elsevier</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIII, 402 Seiten</subfield><subfield code="b">Illustrationen, Diagramme</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">isbdmedia</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Tolérance aux fautes (informatique)</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Ordinateurs / Fiabilité</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Software</subfield><subfield code="0">(DE-588)4055382-6</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Hardware</subfield><subfield code="0">(DE-588)4023422-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2="1"><subfield code="a">Fehlertoleranz</subfield><subfield code="0">(DE-588)4123192-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Krishna, C. Mani</subfield><subfield code="d">ca. 20./21. Jh.</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1234193140</subfield><subfield code="4">aut</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032646088&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032646088</subfield></datafield></record></collection> |
id | DE-604.BV047241838 |
illustrated | Illustrated |
index_date | 2024-07-03T17:04:38Z |
indexdate | 2024-07-10T09:06:37Z |
institution | BVB |
isbn | 9780128181058 0128181052 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032646088 |
oclc_num | 1256443934 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | XIII, 402 Seiten Illustrationen, Diagramme 24 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Elsevier MK, Morgan Kaufmann Publishers, an imprint of Elsevier |
record_format | marc |
spelling | Koren, Israel 1945- Verfasser (DE-588)172194202 aut Fault-tolerant systems Israel Koren ; C. Mani Krishna 2nd edition Cambridge (Mass.) Elsevier MK, Morgan Kaufmann Publishers, an imprint of Elsevier 2021 XIII, 402 Seiten Illustrationen, Diagramme 24 cm txt rdacontent n rdamedia n isbdmedia rdamedia Software (DE-588)4055382-6 gnd rswk-swf Hardware (DE-588)4023422-8 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Fehlertoleranz (DE-588)4123192-2 gnd rswk-swf Tolérance aux fautes (informatique) Ordinateurs / Fiabilité Datenverarbeitung (DE-588)4011152-0 s Fehlertoleranz (DE-588)4123192-2 s DE-604 Software (DE-588)4055382-6 s Hardware (DE-588)4023422-8 s Krishna, C. Mani ca. 20./21. Jh. Verfasser (DE-588)1234193140 aut Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032646088&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Koren, Israel 1945- Krishna, C. Mani ca. 20./21. Jh Fault-tolerant systems Software (DE-588)4055382-6 gnd Hardware (DE-588)4023422-8 gnd Datenverarbeitung (DE-588)4011152-0 gnd Fehlertoleranz (DE-588)4123192-2 gnd |
subject_GND | (DE-588)4055382-6 (DE-588)4023422-8 (DE-588)4011152-0 (DE-588)4123192-2 |
title | Fault-tolerant systems |
title_auth | Fault-tolerant systems |
title_exact_search | Fault-tolerant systems |
title_exact_search_txtP | Fault-tolerant systems |
title_full | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_fullStr | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_full_unstemmed | Fault-tolerant systems Israel Koren ; C. Mani Krishna |
title_short | Fault-tolerant systems |
title_sort | fault tolerant systems |
topic | Software (DE-588)4055382-6 gnd Hardware (DE-588)4023422-8 gnd Datenverarbeitung (DE-588)4011152-0 gnd Fehlertoleranz (DE-588)4123192-2 gnd |
topic_facet | Software Hardware Datenverarbeitung Fehlertoleranz |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032646088&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT korenisrael faulttolerantsystems AT krishnacmani faulttolerantsystems |